Try Our New BETA Version
Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 50 of 273 (0.095 secs)
You searched for: subject:"Cryptography"
[1] 2 3 4 5 6     Next    Last
[audio]Unreleased Tracks - Ulan Batur
Tracks only released on the Toldstøj cassette and here.
Keywords: Cryptography
Downloads: 3
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI. Jahrhunderts - Meister, Aloys, 1866-1925

Keywords: Cryptography
Downloads: 182
[texts]Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes - Simonetta, Francesco, 1410-1480
Book from Project Gutenberg: Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes Library of Congress Classification: Z
Keywords: Cryptography
Downloads: 261
[texts]Cryptography : or, The history, principles, and practice of cipher-writing - Hulme, F. Edward (Frederick Edward), 1841-1909
Keywords: Cryptography
Downloads: 2,212
[texts]Cryptography - Langie, Andr b. 1871-
Bibliography: p. 158
Keywords: Cryptography
Downloads: 3,887
[texts]cryptography_2067_9 - cryptography
Keywords: cryptography
Downloads: 19
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI jahrhunderts - Meister, Aloys, 1866- [from old catalog]
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Keywords: Cryptography
Downloads: 1,812
[texts]cryptoparty - Adam Hyde, Marta Peirano, Asher Wolf, Julian Oliver, Danja Vasiliev, Malte Dik, Jan Gerber, Brian Newbold, Brendan Howell
Attend a CryptoParty to learn and teach how to use basic cryptography tools . A CryptoParty is free, public and fun. It is an open format where everyone is welcome independent of their age, gender or knowledge. People bring their computers, mobile devices, and a willingness to learn! CryptoParty is a decentralized, global initiative to introduce the most basic cryptography software and the fundamental concepts of their operation to the general public, such as the Tor anonymity network, public ke...
Keywords: Cryptography
Downloads: 106
[texts]Cryptography .. - Langie, André, b. 1871-
Bibliography: p. 158. Subtitle on cover [Cryptography ... a study on secret writings]
Keywords: Cryptography
Downloads: 2,206 4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars(1 review)
[texts]Digit Fast Track Cryptography Vol 07 Issue 11 November 2012 - Digit
Fastrack to Cryptography
Keywords: Cryptography
Downloads: 14
[texts]Cryptomenysis patefacta; or, The art of secret information disclosed without a key. Containing, plain and demonstrative rules, for decyphering all manner of secret writing. With exact methods, for resolving secret intimations by signs or gestures, or in speech. As also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c - Falconer, John, decipherer
Gibson 387
Keywords: Cryptography
Downloads: 931
[texts]Cryptography : or the history, principles and practice of cipher- writing - Hulme, F. Edward (Frederick Edward), 1841-1909
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Cryptography; Ciphers
Downloads: 561
[texts]Shorthand, cryptography, etc.; catalogue of books on shorthand, cryptography, etc. in the library of Robert Todd, esq., Hadley Green, Barnet - Todd, Robert
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Shorthand; Cryptography
Downloads: 2,177
[texts]A treatise on the art of decyphering, and of writing in cypher. With an harmonic alphabet - Thicknesse, Philip, 1719-1792
Book digitized by Google from the library of the University of Michigan and uploaded to the Internet Archive by user tpb.
Keywords: Ciphers; Cryptography
Downloads: 332
[texts]Manual for the solution of military ciphers - Hitt, Parker, b. 1878

Keywords: Ciphers; Cryptography
Downloads: 2,186
[audio]Crypto recipes for your data diet - Pieter Rogaar
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at and This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; cryptography
Downloads: 15
[texts]Recueil de plusieurs machines militaires et feux artificiels pour la guerre & recreation : auec l'alphabet de Trittemius par laquelle chacun qui sçait escrire peut promptement composer congruement en latin, aussi le moyen d'escrire la nuict á son amy absent / de la diligence de Iean Appier dit Hanzelet, chalcographe et de François Thybourel, me. chyrurgien. - Trithemius, Johannes
19 cm. (4to). [8], 88, 39, [1], 24, 112, [4], 40, [64] p. : 101 [i.e. 99] ill. (engravings)
Keywords: Artillery Military engineering Cryptography
Downloads: 21
[texts]Mercury, or, The secret and swift messenger : Shewing, how a man may with privacy and speed communicate his thoughts to a friend at any distance - Wilkins, John, 1614-1672
Held by Gallaudet University Library Deaf Collections and Archives, Washington, D.C. (catalog link:
Keywords: Cryptography; Gesture; Sign language
Downloads: 523
[texts]Chaotic keystream generators for additive stream ciphers - Leader, Jeffery J.
Technical report for period January 1993 - April 1993.
Downloads: 84
[texts]Cryptography In C & C++
Cryptography In C & C++
Keywords: Cryptography In C & C++
Downloads: 88
[texts]Fragmentariu Criptografic Texte Alese - Dan Toma Dulciu
Some articles about cryptography in Romanian culture.
Keywords: Romania; Cryptography; Eminescu
Downloads: 64
[texts]Steganographia BSB 1608 - Trithemius, Johannes, 1462-1516
Scans from die Bayerische Staatsbibliothek via Google. This is Trithemius's most famous work, written c. 1499; published Frankfurt, 1606. It was placed on the Index Librorum Prohibitorum in 1609 and removed in 1900. This book is in three volumes, and appears to be about magic; specifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and stegan...
Keywords: occult; demonology; steganography; cryptography
Downloads: 1,112
[texts]The Cryptomenytics and Cryptography of Gustavus Selenus in Nine Books - Gustavus Selenus
Draft of an English translation of the Latin work by Gustavus Selenus (the psuedonym of Augustus, duke of Braunschweig-Lüneburg) written in 1624, translated by John William Henry Walden around 1900. This draft was meant to be published, but it never was. It is currently part of the Fabyan Collection of the rare books collections at the Library of Congress, call number Z103.A95 1900. This file is a scan of a photocopy of the manuscript...
Keywords: cryptography; medieval; translations
Downloads: 1,089
[texts]Mathematical recreations and essays - Ball, W. W. Rouse (Walter William Rouse), 1850-1925
Arithmetical recreations.--Geometrical recreations.--Mechanical recreations.--Chessboard recreations.--Magic squares.--Unicursal problems.--Kirkman's school-girls problem.--Miscellaneous problems.--The mathematical tripos.--Three classical geometrical problems.--The parallel postulate.--Insolubility of the algebraic quintic.--Mersenne's numbers.--String figures.--Astrology.--Cryptographs and ciphers.--Hyper-space.--Time and its measurement.--Matter and ether theories
Keywords: Geometry; Cryptography; Ciphers
Downloads: 2,663
[texts]Simon Singh The Code Book ( Teenage Version)
Simon Singh is a popular author and the famous author of the book Fermat's Last Theorem. This is a book he has written on cryptography and makes for a very interesting read.
Keywords: Simon; Singh; Code; Cryptography
Downloads: 819
[texts]An Overview and Analysis of Private and Public Key DNA Cryptography - K.Sireesha ,V.Srujana
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography
Keywords: Cryptography; SK; AK; PKC; DES; DNA based Cryptography
Downloads: 117
[audio]AntiCryptography - Joel Anderson
How do we communicate with aliens? How do we send them messages that they can understand?
Keywords: SETI; Aliens; cryptography; cryptograms; puzzles
Downloads: 116
[texts]1201700 - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 13
[texts]Fragmentariu Criptografic - Dan Toma Dulciu
Some studies about cryptographic issues.
Keywords: Romanian Cryptography; Eminescu; N. Grigorescu
Downloads: 3
[audio]Samuel-Braunstein-teleportation-part1 - Ian Woolf
Dr Samuel Braunstein about quantum teleportation, why there can never be two Captain Kirks, and how to teleport by fax and truck. Dr Braunstein is professor of informatics at the University of Wales in Bangor, England. THis is part 1 of a two part interview
Keywords: science; teleport; quantum; entanglement; cryptography
Downloads: 388
[movies]CLUG Talk - 27 May 2008 - OpenSSL and Certificates - Stefano Rivera
CLUG Talk: OpenSSL and Certificates Speaker: Stefano Rivera Slides: available here More CLUG Talks
Keywords: CLUG; SSL; OpenSSL; PKI; Cryptography
Downloads: 175
[texts]17. Applied Towards SECURING DATA IN CLOUD Shorunke Muyiwa Musaddiq - SHORUNKE MUYIWA MUSADDIQ
Clouds are rapidly becoming a platform of choice for hosting increasingly complex application software and services. Among the attractive features they offer are elasticity and pay-as-you-go model, which allow businesses to gain access to vast computing resources with minimum upfront investment, and operational costs. Although a great deal of progress has so far been made with respect to the low-level technological underpinning of the clouds, today’s clouds are still considered to be insuffici...
Keywords: Cloud; Data; Cryptography; Encryption; Security
Downloads: 12
[texts]Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes - Currie, Daniel L.;Campbell, Hannelore.
Thesis advisor(s): Cynthia E. Irvine, Harold Fredricksen
Keywords: Cryptography; Data compression (Computer science)
Downloads: 267
[texts]Truetrade: An anonymous decentralized marketplace - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 72
[texts]Maguire's code of ciphers [microform] : a comprehensive system of cryptography designed for general use and arranged in conformity with the rules and regulations adopted by the International Convention of Telegraph Companies, respecting "secret language telegrams" - Maguire, Charles H. J. (Charles Henry Joseph)
Filmed from a copy of the original publication held by the D.B. Weldon Library, University of Western Ontario
Keywords: Cryptography; Ciphers; Cryptograhie; Chiffres (Cryptographie)
Downloads: 1,959
[texts]Combined Implementation of Robust Cryptosystem for Non-invertible Matrices based on Hill Cipher and Steganography
In this paper, we have combined the RobustCryptosystem for Non-invertible matrices based on Hill Ciphertechnique with steganography method in order to securelytransmit text message. The steganography method used is LSBinsertion technique. The encryption and steganographymethods are used subsequently along with two randomizationtechnique: one of XOR the encrypted text and another ofrandomized LSB insertion in any cover image...
Keywords: cryptography; steganography; plaintext; stegoobject; cipher
Downloads: 33
[texts]Speculum imaginum veritatis occultæ : exhibens symbola, emblemata, hieroglyphica, ænigmata, omnitam materiæ, quam formæ varietate; exemplis simul, ac præceptis illustratum - Masen, Jakob, 1606-1681
Signatures: A * 2* 3* 4*⁴ ²A B-4A a-d e⁴
Keywords: Signs and symbols; Cryptography; Emblems
Downloads: 672
[audio]Martin Hellman at Deusto University
Charla de Martin Hellman en la Universidad de Deusto sobre criptografía. Martin Hellman's talk about cryptography at University of Deusto.
Keywords: Martin Hellman, Deusto, university, cryptography, PKI
Downloads: 183
[texts]Secure and Efficient Cluster Selection Mechanism Using Wimax - Vinni Kaur, Amanpreet Kaur, Arvind Pathak
WiMAX technology is a telecommunications technology that offers transmission of wireless data via a number of transmission methods; such as portable or fully mobile internet access via point to multipoint links. As the size of a Wireless Network is much vast because of this the network containing number of base station and mobile station is divided in terms of clusters. Each cluster having a cluster head or the base station the controls all nodes of the network...
Keywords: WiMAX; Handoff; Packets; cryptography; secure and efficient
Downloads: 71
[audio]Samuel-Braunstein-teleportation-part2 - Ian Woolf
Continuing my discussion with Dr Samuel Brainstein about Quantum teleportation, entanglement, encryption, eavesdropping, and true love. Dr Braunstein is Professor of Informatics at the University of Wales in Bangor, England. This is part two of a two part interview
Keywords: science; teleport; quantum; braunstein; cryptography; encrypt; entanglement
Downloads: 404
[texts]Principles of Applied Mathematics - Lempel-Ziv Notes - Daniel Kleitman;Peter Shor
We now explain the algorithm that Lempel and Ziv gave in a 1978 paper, and generally called LZ78. This is opposed to LZ77, an earlier algorithm which di_ered signi�cantly in the implementation details but is based on the same general idea. This idea is that if some text is not random, a substring that you see once is more likely to appear again than substrings you haven�t seen.
Keywords: Maths; Algebra; Coding and Cryptography; Codes; Mathematics
Downloads: 13
[texts]Fish and I - W.T. Tutte

Keywords: Maths; Algebra; Coding and Cryptography; Mathematics
Downloads: 17
[texts]A Secured Approach to Visual Cryptographic Biometric Template
BIOMETRIC authentication systems are gainingwide-spread popularity in recent years due to the advances insensor technologies as well as improvements in the matchingalgorithms. Most biometric systems assume that the templatein the system is secure due to human supervision (e.g.,immigration checks and criminal database search) or physicalprotection (e.g., laptop locks and door locks). Preserving theprivacy of digital biometric data (e.g., face images) stored in acentral database has become of para...
Keywords: Visual cryptography; Image scrambling; Random permutation
Downloads: 33
[texts]A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
Downloads: 199
[texts]A graphic user interface for rapid integration of steganography software - Wootten, David Raiman.
"March 1996."
Keywords: Cryptography; Graphical user interfaces (Computer systems)
Downloads: 251
[movies]EHSM 2014: Peter McMahon - Basics Of Quantum Cryptography - Speaker: Peter McMahon. EHSM music by Frank „netpoet“ Stiegler. EHSM beamsystem by Christoph „gizmo“ Mütze. EHSM logo by Eleonor Neudeau. EHSM font by Mathias Bär.
Exceptional Hardware and Software Meeting 2014 pushing frontiers of open source & DIY DESY Hamburg site, June 27-29 2014 Abstract: Quantum Mechanics is the framework for the laws of nature that are relevant when dealing with very small length- and energy-scales. As has widely been popularized, quantum mechanics leads to rather counterintuitive behavior when we consider small (and in special circumstances, sometimes even large) numbers of atoms...
Keywords: EHSM; quantum mechanics; quantum cryptography; theory
Downloads: 47
[texts]17. Eng Unique Information Based Secure RSA Neha Gupta - Neha Gupta, Ravi Kumar Gupta & Shipra Gupta
Computer security is one of the most important parameters considered in any computer system to prevent any data misuse by an unauthorized/ outside intrusion. Cryptography is one technique for data/ computer security. In this paper,           we have proposed a technique for a more secure data transfer which is a alteration to the classical public key crytogarphy method known as Unique Information Based Secure RSA...
Keywords: Cryptography; Public Key; Private Key; Encryption; Decryption
Downloads: 6
[movies]Eben Moglen + Bruce Schneier - Internet Society New York Chapter
Bruce Schneier in conversation with Eben Moglen at Columbia Law School on December 12 2013.
Keywords: NSA; surveillance; Snowden; security; privacy; cryptography; Internet
Downloads: 1,848
[texts]3. A Behaviour Of RSA.full
RSA cryptographic algorithm used to encrypt and decrypt the messages for the citation of message in user’s Communication over the secure transmission channel like internet. it will also throw some light on the flaws of some otherpublic key cryptographic algorithms in comparison to RSA algorithm. RSA algorithm will be used to generate key pairs (private key and public key), which are generated using 19 digit prime value, which will be used to encrypt and decrypt the messages...
Keywords: Cryptography; RSA; Big Integer; Secure Communication Channel
Downloads: 76
[texts]The mathematical and philosophical works of the Right Reverend John Wilkins ... to which is prefix'd the author's life, and an account of his works - Wilkins, John, 1614-1672
Various paging
Keywords: Science; Plurality of worlds; Mechanics; Cryptography
Downloads: 735
[1] 2 3 4 5 6     Next    Last
Advanced search

Group results by:

> Relevance

Related mediatypes


Terms of Use (31 Dec 2014)